Episodes

  • **Threat Hunting Workshop: Hunting for Collection
    October 2, 2024 | 12:00 - 1:00 PM ET
    Sign Up > https://intel471.com/resources/webinars/threat-hunting-workshop-hunting-for-collection

    In this episode of Out of the Woods: The Threat Hunting Podcast, Scott and Lee discuss four key topics: North Korea’s social engineering attacks on the crypto industry, the rise of the malicious Chrome extension Luma C2 Stealer, a phishing and doxxing campaign by Russian threat actors targeting NGOs, and hacktivist attacks on Russian and Belarusian institutions using ransomware and common tools. They highlight the growing sophistication of these tactics and stress the importance of vigilance and proactive threat hunting to defend against these increasingly complex threats.

    Top Headlines:

    1. FBI | Public Service Announcement - North Korea Aggressively Targeting Crypto Industry with Well-Disguised Social Engineering Attacks: https://www.ic3.gov/Media/Y2024/PSA240903
    2. Cybersecurity News | Beware the Drive-By Download: LummaC2 Stealer and Malicious Chrome Extension Wreak Havoc: https://securityonline.info/beware-the-drive-by-download-lummac2-stealer-and-malicious-chrome-extension-wreak-havoc/?&web_view=true
    3. The Hacker News | North Korean Threat Actors Deploy COVERTCATCH Malware via LinkedIn Job Scams: https://thehackernews.com/2024/09/north-korean-threat-actors-deploy.html
    4. SecureList | Head Mare: Adventures of a Unicorn in Russia and Belarus: https://securelist.com/head-mare-hacktivists/113555/

    ----------

    Stay in Touch!Twitter: https://twitter.com/Intel471Inc
    LinkedIn: https://www.linkedin.com/company/intel-471/
    YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg
    Discord: https://discord.gg/DR4mcW4zBr
    Facebook: https://www.facebook.com/Intel471Inc/

  • In this episode of "Out of the Woods: The Threat Hunting Podcast," Scott and Tom dive into the latest threat hunting headlines for the week of September 2nd, 2024. They explore how basic techniques are being repurposed in advanced ways, such as using Google Sheets for command and control in a suspected espionage campaign and employing web dev to enhance phishing attacks. The discussion also covers a new wave of skimming attacks targeting e-commerce sites and a deep dive into APT32’s advanced persistence tactics in a long-term intrusion. Scott and Tom offer insights and strategies for threat hunters to detect and counter these evolving threats.

    Top Headlines:

    1. Huntress | Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders: https://www.huntress.com/blog/advanced-persistent-threat-targeting-vietnamese-human-rights-defenders?&web_view=true
    2. Objective-See | A Surreptitious Cryptocurrency Miner in the Mac App Store?: https://objective-see.org/blog/blog_0x2B.html
    3. Malwarebytes | Hundreds of Online Stores Hacked in New Campaign: https://www.malwarebytes.com/blog/news/2024/08/hundreds-of-online-stores-hacked-in-new-campaign?web_view=true
    4. Proofpoint US | The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers "Voldemort": https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort

    ----------

    Stay in Touch!Twitter: https://twitter.com/Intel471Inc
    LinkedIn: https://www.linkedin.com/company/intel-471/
    YouTube: https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg
    Discord: https://discord.gg/DR4mcW4zBr
    Facebook: https://www.facebook.com/Intel471Inc/

  • Missing episodes?

    Click here to refresh the feed.

  • In this episode of the "Out of the Woods Threat Hunting Podcast," Scott and Tom break down the top threat hunting stories for the week of August 26, 2024. They dive into SetXP, a stealthy Linux malware that manipulates UDEV rules to evade detection, and explore why it’s not yet on the MITRE ATT&CK radar. The duo also covers PeakLight, a new memory-only dropper, and Stick Stealer, a malware targeting browser data and crypto wallets. Wrapping up with insights from a BlackSuit ransomware breach, they discuss how attackers often reuse old techniques in new ways. This episode challenges the notion of what truly makes an execution unique, offering practical tips for staying ahead of evolving threats.

    1. AON | Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules: https://www.aon.com/en/insights/cyber-labs/unveiling-sedexp
    2. The DFIR Report | BlackSuit Ransomware: https://thedfirreport.com/2024/08/26/blacksuit-ransomware/
    3. Check Point Research | Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove: https://research.checkpoint.com/2024/unmasking-styx-stealer-how-a-hackers-slip-led-to-an-intelligence-treasure-trove/
    4. Google Cloud Blog | PEAKLIGHT: Decoding the Stealthy Memory-Only Malware: https://cloud.google.com/blog/topics/threat-intelligence/peaklight-decoding-stealthy-memory-only-malware/?&web_view=true


    Stay in Touch!Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • In this week's Top 5 Threat Hunting Headlines, Scott and Tom discuss top cybersecurity threats, including Kaspersky's Tusk InfoStealer campaign, a cloud extortion campaign exploiting AWS environments, APT41's advanced tactics against a Taiwanese research institute, and the Banshee InfoStealer targeting macOS. They also explore the impact of AI on cybersecurity, emphasizing the need for SOCs to evolve with new talent and strategies to address emerging threats. The episode underscores the importance of staying vigilant and adapting to the rapidly changing threat landscape.


    Top 5 Threat Hunting Headlines - 19 Aug 2024
    1. Secure List | Tusk Campaign Uses Infostealers and Clippers for Financial Gainhttps://securelist.com/tusk-infostealers-campaign/113367/2. Unit 42 | Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environmentshttps://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/3. Cisco Talos Blog | APT41 Likely Compromised Taiwanese Government-Affiliated Research Institute with ShadowPad and Cobalt Strikehttps://blog.talosintelligence.com/chinese-hacking-group-apt41-compromised-taiwanese-government-affiliated-research-institute-with-shadowpad-and-cobaltstrike-2/?&web_view=true4. Elastic Security Labs | Beyond the Wail: Deconstructing the BANSHEE Infostealerhttps://www.elastic.co/security-labs/beyond-the-wail5. Help Net Security | 74% of IT Professionals Worry That AI Tools Will Replace Themhttps://www.helpnetsecurity.com/2024/08/15/it-professionals-ai-worry/?web_view=true
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Top 5 Threat Hunting Headlines - 12 Aug 2024
    1. DarkReading | SaaS Apps Present an Abbreviated Kill Chain for Attackershttps://www.darkreading.com/application-security/saas-apps-present-abbreviated-kill-chain-for-attackers?&web_view=true2. ReasonLabs | Enterprise Grade Security to All of Your Personal Deviceshttps://reasonlabs.com/research/new-widespread-extension-trojan-malware-campaign3. DFIR | Threat Actors' Toolkit: Leveraging Silver, PoshC2 & Batch Scriptshttps://thedfirreport.com/2024/08/12/threat-actors-toolkit-leveraging-sliver-poshc2-batch-scripts/4. SafeBreach | Downgrade Attacks Using Windows Updateshttps://www.safebreach.com/blog/downgrade-attacks-using-windows-updates/5. Cyble | Double Trouble: Latrodectus and ACR Stealer Observed Spreading Via Google Authenticator Phishing Sitehttps://cyble.com/blog/double-trouble-latrodectus-and-acr-stealer-observed-spreading-via-google-authenticator-phishing-site/?&web_view=true
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Threat Hunting Workshop: Hunting for Command and Control
    31 July 2024 | 12:00 - 1:00 pm ETRegister Here!Black Hat 2024 Training with Lee Archinal
    "A Beginner's Guide to Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs" | Secure your spot now at a discounted rate:3-4 Aug 2024: Sign Up Here!5-6 Aug 2024: Sign Up Here!-----

    Top 5 Threat Hunting Headlines - 29 July 2024
    1. Bleeping Computer | Acronis Warns of Cyber Infrastructure Default Password Abused in Attackshttps://www.bleepingcomputer.com/news/security/acronis-warns-of-cyber-infrastructure-default-password-abused-in-attacks/?&web_view=true2. Guardio Labs | “EchoSpoofing” – A Massive Phishing Campaigns Exploiting Proofpoint’s Email Protevtion to Dispatch Millions of Perfectly Spoofed Emailshttps://labs.guard.io/echospoofing-a-massive-phishing-campaign-exploiting-proofpoints-email-protection-to-dispatch-3dd6b5417db6?gi=b32e776ffab33. Esentire | Introducing Gh0stGambit: A Dropper for Deploying Gh0st RAThttps://www.esentire.com/blog/a-dropper-for-deploying-gh0st-rat?&web_view=true4. Check Point Research | Stargazers Ghost Networkhttps://research.checkpoint.com/2024/stargazers-ghost-network/5. Help Net Security | Most CISO’s Feel Unprepared for New Compliance Regulationshttps://www.helpnetsecurity.com/2024/07/26/cisos-compliance-regulations-preparedness/?web_view=true-----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Threat Hunting Workshop: Hunting for Command and Control
    31 July 2024 | 12:00 - 1:00 pm ETRegister Here!Black Hat 2024 Training with Lee Archinal
    "A Beginner's Guide to Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs" | Secure your spot now at a discounted rate:3-4 Aug 2024: Sign Up Here!5-6 Aug 2024: Sign Up Here!-----

    Top 5 Threat Hunting Headlines - 22 July 2024
    1. Popular Ukrainian Telegram Channels Hacked to Spread Russian Propagandahttps://therecord.media/ukrainian-news-telegram-channels-hacked-russian-propaganda?&web_view=true2. New Play Ransomware Linux Variant Targets ESXI Shows Ties with Prolific Pumahttps://www.trendmicro.com/en_us/research/24/g/new-play-ransomware-linux-variant-targets-esxi-shows-ties-with-p.html3. Dragos Frostygoop Reporthttps://regmedia.co.uk/2024/07/23/dragos_frostygoop-report.pdf4. Likely Ecrome Actor Capitalizing on Falcon Sensor Issueshttps://www.crowdstrike.com/blog/likely-ecrime-actor-capitalizing-on-falcon-sensor-issues/5. Internet Organised Crime Threat Assessment 2024https://www.europol.europa.eu/cms/sites/default/files/documents/Internet%20Organised%20Crime%20Threat%20Assessment%20IOCTA%202024.pdf
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Threat Hunting Workshop: Hunting for Command and Control
    31 July 2024 | 12:00 - 1:00 pm ETRegister Here!Black Hat 2024 Training with Lee Archinal
    "A Beginner's Guide to Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs"
    Regular Registration closes on July 19, 2024! Secure your spot now at a discounted rate:3-4 Aug 2024: Sign Up Here!5-6 Aug 2024: Sign Up Here!-----

    Top 5 Threat Hunting Headlines - 15 July 2024
    1. Infosecurity Magazine | CISA Urges Software Makers to Eliminate OS Command Injection Flawshttps://www.infosecurity-magazine.com/news/cisa-software-eliminate-command/?&web_view=true2. Wazuh | Detecting Living Off the Land Attacks with Wazuhhttps://wazuh.com/blog/detecting-living-off-the-land-attacks-with-wazuh/3. ClickFIx Deception: A Social Engineering Tactic to Deploy Malwarehttps://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/4. The Hacker News | 10,000 Victims a Day: Infostealer Garden of Low-Hanging Fruithttps://thehackernews.com/2024/07/10000-victims-day-infostealer-garden-of.html?m=15. Blackberry | Coyote Banking Trojan Targets LATAM with a Focus on Brazillian Financial Institutions https://blogs.blackberry.com/en/2024/07/coyote-banking-trojan-targets-latam-with-a-focus-on-brazilian-financial-institutions?&web_view=true
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Threat Hunting Workshop: Hunting for Command and Control
    31 July 2024 | 12:00 - 1:00 pm ETRegister Here!Black Hat 2024 Training with Lee Archinal
    "A Beginner's Guide to Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs"
    Regular Registration closes on July 19, 2024! Secure your spot now at a discounted rate:3-4 Aug 2024: Sign Up Here!5-6 Aug 2024: Sign Up Here!-----

    Top 5 Threat Hunting Headlines - 1 July 2024
    1. Qualys Security Blog | Remote Unauthenticated Code Execution Vulnerability in OpenSSH Serverhttps://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server?web_view=true2. ZScaler | Kimsuky Deploys TRANSLATEXT to Target South Korean Academiahttps://www.zscaler.com/blogs/security-research/kimsuky-deploys-translatext-target-south-korean-academia3. The Register | Police Allege 'Evil Twin' In-Flight WiFi Used to Steal Info & Australian Federal Police | Man Charged Over Creation of 'Evil Twin' Free WiFi Networks to Access Personal Datahttps://www.theregister.com/2024/07/01/australia_evil_twin_wifi_airline_attack/?&web_view=truehttps://www.afp.gov.au/news-centre/media-release/man-charged-over-creation-evil-twin-free-wifi-networks-access-personal4. GitHub | JPCERTCC/LogonTracerhttps://github.com/JPCERTCC/LogonTracer5. Help Net Security | 75% of New Vulnerabilities Exploited Within 19 Days https://www.helpnetsecurity.com/2024/06/27/nvd-vulnerabilities/?web_view=true-----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Black Hat 2024 Training with Lee Archinal
    "A Beginner's Guide to Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs"
    Regular Registration closes on July 19, 2024! Secure your spot now at a discounted rate:
    *3-4 Aug 2024: Sign Up Here!
    *5-6 Aug 2024: Sign Up Here!

    -----

    Top 5 Threat Hunting Headlines - 25 June 2024
    1. Positive Technologies | ExCobalt: GORed, the hidden-tunnel techniquehttps://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/excobalt-gored-the-hidden-tunnel-technique/2. Cisco Talos | SneakyChef espionage group targets government agencies with SugarCh0st and more infection techniqueshttps://blog.talosintelligence.com/sneakychef-sugarghost-rat/3. Help Net Security | 1 out of 3 breaches go undetected https://www.helpnetsecurity.com/2024/06/24/detecting-breaches-struggle-in-organizations/?web_view=true4. Ars Technica | Dell said return to office or else - nearly half of the workers chose "or else"https://arstechnica.com/gadgets/2024/06/nearly-half-of-dells-workforce-refused-to-return-to-the-office/5. Infosecurity Magazine | Cybersecurity Burnout Costing Firms $700m+ Annuallyhttps://www.infosecurity-magazine.com/news/cybersecurity-burnout-costing-700m/?&web_view=true-----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Black Hat 2024 Training with Lee Archinal
    "A Beginner's Guide to Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs"
    Regular Registration closes on July 19, 2024! Secure your spot now at a discounted rate:
    *3-4 Aug 2024: Sign Up Here!
    *5-6 Aug 2024: Sign Up Here!

    -----

    Top 5 Threat Hunting Headlines - 10 June 2024
    1. Google Cloud | UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortionhttps://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion2. Morphisec | Howling at the Inxos: Sticky Werewolf's Latest Malicious Aviation Attackshttps://blog.morphisec.com/sticky-werewolfs-aviation-attacks3. Vonahi Security | Automated Penetration Testing & Cyber Security Services - Top 10 Crticial Pentest Findings Reporthttps://www.vonahi.io/pentest-report-2024?utm=source=701Rp00000B6bue4. The DFIR Report | IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deploymenthttps://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/5. Zscaler | Technical Analysis of the Latest Variant of ValleyRAThttps://www.zscaler.com/blogs/security-research/technical-analysis-latest-variant-valleyrat-----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Black Hat 2024 Training with Lee Archinal
    "A Beginner's Guide to Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs"
    Early registration closes on May 24, 2024! Secure your spot now at a discounted rate:
    *3-4 Aug 2024: Sign Up Here!
    *5-6 Aug 2024: Sign Up Here!

    -----

    Top 5 Threat Hunting Headlines - 22 May 2024
    1. Kandji | Malware: Cuckoo Behaves Like Cross Between Infostealer and Spywarehttps://blog.kandji.io/malware-cuckoo-infostealer-spyware2. Rapid7 | Ongoing Malvertising Campaign Leads to Ransomwarehttps://www.rapid7.com/blog/post/2024/05/13/ongoing-malvertising-campaign-leads-to-ransomware/3. Unit 42 | Payload Trends in Malicious OneNote Sampleshttps://unit42.paloaltonetworks.com/payloads-in-malicious-onenote-samples/4. Check Point Research | Bad Karma, No Justice: Void Manticore Destructive Activities in Isrealhttps://research.checkpoint.com/2024/bad-karma-no-justice-void-manticore-destructive-activities-in-israel/5. Aqua Nautilus | Kinsing Demystified - A comprehensive Technical Guidehttps://1665891.fs1.hubspotusercontent-na1.net/hubfs/1665891/Threat%20reports/AquaSecurity_Kinsing_Demystified_Technical_Guide.pdf
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Top 5 Threat Hunting Headlines - 13 May 2024
    1. Infosecurity Magazine | AI-Powered Russian Network Pushes Fake Political Newshttps://www.infosecurity-magazine.com/news/aipowered-russian-network-fake-news/?&web_view=true2. Elastic Security Labs | Dissecting REMCOS RAT: An in-depth analysis of a widespread 2024 malware, Part Twohttps://www.elastic.co/security-labs/dissecting-remcos-rat-part-two3. The Record | Cyberthreat Landscape Permanently Altered by Chinese Operations, US Officials Sayhttps://therecord.media/cyberthreat-landscape-altered-chinese-operations?&web_view=true4. Elastic Security Labs | Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Fourhttps://www.elastic.co/security-labs/dissecting-remcos-rat-part-four5. Help Net Security | How Secure is the "Password Protection" on Your Files and Drives?https://www.helpnetsecurity.com/2024/05/10/password-protect-pdf-excel-files/?web_view=true
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Top 5 Threat Hunting Headlines - 22 April 2024
    1. The Record | NATO to launch new cyber center to contest cyberspace 'at all times'https://therecord.media/nato-new-military-civilian-cyber-center-mons-belgium?&web_view=true2. Securonix | Securonix Threat Research Knowledge Sharing Series: Detecting DLL Sideloading Techniques Found In Recent Real-world Malware Attack Chainshttps://www.securonix.com/blog/detecting-dll-sideloading-techniques-in-malware-attack-chains/3. Darkreading | Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malwarehttps://www.darkreading.com/application-security/evil-xdr-researcher-turns-palo-alto-software-into-perfect-malware?&web_view=true4. HackTrickshttps://book.hacktricks.xyz5. CSA | Deploying AI Systems Securelyhttps://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF-----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • Top 5 Threat Hunting Headlines - 15 April 2024
    1. Volexity | Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/2. Trend Micro | Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbearhttps://www.trendmicro.com/en_no/research/24/d/earth-hundun-waterbear-deuterbear.html3. The Cyber Express | FatalRAT Targets Cryptocurrency Users With DLL Side-loading Techniqueshttps://thecyberexpress.com/fatalrat-phishing-campaign/?&web_view=true4. Elastic Security Labs | Linux detection engineering with Auditdhttps://www.elastic.co/security-labs/linux-detection-engineering-with-auditd5. NIST Special Publication | Incident Response Recommendations and Considerations for Cybersecurity Risk Managementhttps://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.ipd.pdf
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • To be fully interactive by asking questions and giving feedback and opinions in real-time, join our Discord Server! Be sure to join the live recording of our next episode to be a part of the fun! --> https://discord.gg/sHw5c3qwRh

    Looking to have your cyber security questions or insights featured on our next episode? Tag #OutOfTheWoodsPodcast on your socials when you share your thoughts. No question is too specific, no insight too niche—we're here for it all!

    ------------

    Follow Us!
    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • **[LIVE] Out of the Woods Podcast Episode
    April 4, 2024 | 7:00 - 8:30 PM ET
    More Details/Registration 👇https://info.cyborgsecurity.com/en-us/threathuntingpodcast-e15
    Get your FREE HUNTER Community Account today! 👇https://www.cyborgsecurity.com/user-account-creation/

    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • **[LIVE] Out of the Woods Podcast Episode
    April 4, 2024 | 7:00 - 8:30 PM ET
    More Details/Registration 👇https://info.cyborgsecurity.com/en-us/threathuntingpodcast-e15
    ----

    Top 5 Threat Hunting Headlines - 20 March 2024
    1. IBM X-Force Threat Intelligence Index 2024https://www.ibm.com/reports/threat-intelligence?utm_content=SRCWW&p1=Search&p4=43700079592066619&p5=e&gad_source=1&gclsrc=ds2. Almond | UAC Bypass via Elevated .NET Applicationshttps://offsec.almond.consulting/UAC-bypass-dotnet.html3. Help Net Security | Only 13% of Medical Devices Support Endpoint Protection Agentshttps://www.helpnetsecurity.com/2024/03/14/medical-devices-cybersecurity-concerns/?web_view=true4. Sonicwall - By Security News | Interesting Multi-Stage StopCrypt Ransomware Variant Propagating in the Wildhttps://blog.sonicwall.com/en-us/2024/03/new-multi-stage-stopcrypt-ransomware/5. Bleeping Computer | Hackers Exploit Aiohttp Bug to Find Vulnerable Networkshttps://www.bleepingcomputer.com/news/security/hackers-exploit-aiohttp-bug-to-find-vulnerable-networks/?&web_view=true
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • **Threat Hunting Workshop: Hunting for Initial Access
    March 20, 2024 | 12:00 - 1:00 PM ET
    More Details/ Registration 👇https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-10

    **[LIVE] Out of the Woods Podcast Episode
    April 4, 2024 | 7:00 - 8:30 PM ET
    More Details/Registration 👇https://info.cyborgsecurity.com/en-us/threathuntingpodcast-e15
    ----

    Top 5 Threat Hunting Headlines - 11 March 2024
    1. The Hacker News | Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secretshttps://thehackernews.com/2024/03/microsoft-confirms-russian-hackers.html?m=1https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/2. Almond | UAC Bypass via Elevated .NET Applications https://offsec.almond.consulting/UAC-bypass-dotnet.html3. Check Point Research | Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/?web_view=true4. https://www.nieuwsblad.be/cnt/dmf20240306_93861112

    5. Infosecurity Magazine | Dropbox Used to Steal Credentials and Bypass MFA in Novel Phishing Campaignhttps://www.infosecurity-magazine.com/news/dropbox-credentials-bypass-mfa/?&web_view=true-----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

  • **Threat Hunting Workshop: Hunting for Initial Access
    March 20, 2024 | 12:00 - 1:00 PM ET
    More Details/ Registration 👇https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-10


    Top 5 Threat Hunting Headlines - 04 March 2024
    1. TrendMicro - Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPOhttps://www.trendmicro.com/en_us/research/24/c/multistage-ra-world-ransomware.html?&web_view=true2. Help Net Security - Cybercriminals harness AI for new era of malware developmenthttps://www.helpnetsecurity.com/2024/03/01/hi-tech-crime-trends-2023-2024/?web_view=true3. Malware Bytes - Malicious meeting invite fix targets Mac usershttps://www.malwarebytes.com/blog/news/2024/03/malicious-meeting-invite-fix-targets-mac-users?&web_view=true4. Security Affairs - A U.S. Court ordered surveillance firm NSO Group to hand over the source code for its Pegasus spyware and other products to Metahttps://securityaffairs.com/159847/security/nso-group-vs-meta-pegasus-hand-over.html?web_view=true5. Security Affairs - U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft Streaming Service vulnerability to its Known Exploited Vulnerabilities cataloghttps://securityaffairs.com/159796/security/cisa-adds-microsoft-streaming-service-bug-known-exploited-vulnerabilities-catalog.html?web_view=true
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc